Nothing Special   »   [go: up one dir, main page]

skip to main content
10.1145/3437120.3437322acmotherconferencesArticle/Chapter ViewAbstractPublication PagespciConference Proceedingsconference-collections
research-article

A Review on Hardware Security Countermeasures for IoT: Emerging Mechanisms and Machine Learning Solutions

Published: 04 March 2021 Publication History

Abstract

The evolution of the Internet of Things (IoT) ecosystem necessitates the mitigation of security threats not only in the software domain but also in the hardware. However, owing to the inherent characteristics and limitations of the IoT devices, designing hardware security solutions is a complex and non-trivial process. This paper surveys recent research works, in which countermeasures against potential threats of hardware security of IoT devices have been proposed. In this context, employing machine-learning (ML) methods is also expected to lead to effective solutions. Towards this end, this paper provides an overview of ML-based countermeasures. Finally, open issues in these relevant fields are given, stimulating further research.

References

[1]
Karm Veer Arya, Robin Singh Bhadoria, and Narendra S. Chaudhari. 2018. Emerging Wireless Communication and Network Technologies: Principle, Paradigm and Performance. Springer. Berlin, Germany.
[2]
Minhaj Ahmad Khana and Khaled Salah. 2018. IoT security: Review, blockchain solutions, and open challenges. Future Generation Computer Systems. 82, 395-411.
[3]
Swarup Bhunia and Mark Tehranipoor. 2018. Hardware Security: A Hands-on Learning Approach. Elsevier, Morgan Kaufmann. Cambridge, United States.
[4]
Antonis Paschalis, Ioannis Voyiatzis and Dimitris Gizopoulos. 2012. Accumulator based 3-weight pattern generation. IEEE Transactions on Very Large Scale Integration (VLSI) Systems, 20, 2, 357-361.
[5]
Ioannis Voyiatzis, Antonis Paschalis, Dimitrios Nikolos and Consantin Halatsis. 1998. R-CBIST: An effective RAM-based Input Vector Monitoring Concurrent BIST technique. IEEE International Test Conference (TC), 918-925.
[6]
Constantinos Efstathiou, Ioannis Voyiatzis and Nicolas Sklavos. 2008. On the modulo 2n+1 multiplication for diminished-1 operands. 2nd International Conference on Signals, Circuits and Systems (SCS) 2008, 4746907.
[7]
Ioannis Voyiatzis. 2008. An accumulator-based compaction scheme for online BIST of RAMs. IEEE Transactions on Very Large Scale Integration (VLSI) Systems. 16, 9, 1248-1251.
[8]
Ioannis Voyiatzis and Costas Efstathiou. 2014. Input vector monitoring concurrent BIST architecture using SRAM cells. IEEE Transactions on Very Large Scale Integration (VLSI) Systems, 22, 7, 1625-1629.
[9]
Ioannis Voyiatzis, Th. Haniotakis, Constantinos Efstathiou and H. Antonopoulou. 2010. A concurrent BIST architecture based on monitoring square windows. 5th Conference on Design and Technology of Integrated Systems in Nanoscale Era, DTIS 2010, 1-6.
[10]
Simranjeet Sidhu, Bassam J. Mohd and Thaier Hayajneh. 2019. Hardware Security in IoT Devices with Emphasis on Hardware Trojans. Journal of Sensor and Actuator Networks 8, 3, 42.
[11]
Armin Babaei and Gregor Schiele. 2019. Physical Unclonable Functions in the Internet of Things: State of the Art and Open Challenges. Sensors 19, 14, 3208.
[12]
Fatima Hussain, Rasheed Hussain, Syed Ali Hassan and Ekram Hossain. 2020. Machine Learning in IoT Security: Current Solutions and Future Challenges. IEEE Communications Surveys & Tutorials 22, 3, 1686-1721.
[13]
Rana Elnaggar and Krishnendu Chakrabarty. 2018. Machine Learning for Hardware Security: Opportunities and Risks. Journal of Electronic Testing, 34, 183-201.
[14]
Zhao Huang, Quan Wang, Yin Chen and Xiaohong Jiang. 2020. A Survey on Machine Learning Against Hardware Trojan Attacks: Recent Advances and Challenges. IEEE Access, 8, 10796-10826.
[15]
Konstantinos G. Liakos, Georgios K. Georgakilas, Serafeim Moustakidis, Nicolas Sklavos and Fotis C. Plessas. 2020. Conventional and Machine Learning Approaches as Countermeasures against Hardware Trojan Attacks. Microprocessors and Microsystems, Elsevier, 79, 2020.
[16]
Lilian Bossuet, Xuan Thuy Ngo, Zouha Cherif and Viktor Fischer. 2014. A PUF based on a transient effect ring oscillator and insensitive to locking phenomenon. IEEE Trans. Emerg. Topics Comput. 2, 1, 30-36.
[17]
Cédric Marchand 2018. Implementation and Characterization of a Physical Unclonable Function for IoT: A Case Study With the TERO-PUF. IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems 37, 1, 97-109.
[18]
Yachuan Pang, Bin Gao, Bohan Lin, He Qian and Huaqiang Wu. 2019. Memristors for Hardware Security Applications. Adv. Electron. Mater. 2019, 5, 1800872.
[19]
Mohamed A. Bahnasawi 2016. ASIC-oriented comparative review of hardware security algorithms for internet of things applications. 28th International Conference on Microelectronics (ICM), 285-288, Giza.
[20]
Christophe De Cannière, Orr Dunkelman and Miroslav Knežević. 2009. A Family of Small and Efficient Hardware-Oriented Block Ciphers. In: Clavier C., Gaj K. (eds) Cryptographic Hardware and Embedded Systems - CHES 2009. CHES 2009. Lecture Notes in Computer Science, vol 5747. Springer, Berlin, Heidelberg.
[21]
Jiann-Shiun Yuan, Jie Lin, Qutaiba Alasad and Shayan Taheri. 2017. Ultra-Low-Power Design and Hardware Security Using Emerging Technologies for Internet of Things. Electronics 2017, 6, 67.
[22]
Jaya Dofe, Jonathan Frey and Qiaoyan Yu. 2016. Hardware security assurance in emerging IoT applications. IEEE International Symposium on Circuits and Systems (ISCAS), 2050-2053, Montreal, QC.
[23]
Sayadi Hossein, Mohammadi Makrani Hosein Randive, Onkar, P D Sai Manoj, Rafatirad Setareh and Homayoun Houman. 2018. Customized Machine Learning-Based Hardware-Assisted Malware Detection. In: Embedded Devices. 1685-1688.
[24]
Hawzhin Mohammed, Tolulope A. Odetola, Syed Rafay Hasan, Sari Stissi, Isaiah Garlin and Falah Awwad. 2019. (HIADIoT): Hardware Intrinsic Attack Detection in Internet of Things; Leveraging Power Profiling. In: IEEE 62nd International Midwest Symposium on Circuits and Systems (MWSCAS), Dallas, TX, USA, 852-855.
[25]
Ahmad O. Aseeri, Yu Zhuang and Mohammed Saeed Alkatheiri. 2018. A Machine Learning-Based Security Vulnerability Study on XOR PUFs for Resource-Constraint Internet of Things. IEEE International Congress on Internet of Things (ICIOT), San Francisco, CA, 49-56.
[26]
Jiliang Zhang and Gang Qu. 2020. Physical Unclonable Function-Based Key Sharing via Machine Learning for IoT Security. IEEE Transactions on Industrial Electronics, 67, 8, 7025-7033.
[27]
Baibhab Chatterjee, Debayan Das, Shovan Maity, and Shreyas Sen. 2019. RF-PUF: Enhancing IoT Security Through Authentication of Wireless Nodes Using In-Situ Machine Learning. IEEE Internet of Things Journal, 6, 1, 388-398.

Cited By

View all
  • (2024)Hardware Security for Internet of Things Identity AssuranceIEEE Communications Surveys & Tutorials10.1109/COMST.2024.335516826:2(1041-1079)Online publication date: Oct-2025
  • (2024)Enabling Lawful Interception in Environments Protected by IoT SafeguardElectronic Government and the Information Systems Perspective10.1007/978-3-031-68211-7_12(139-153)Online publication date: 15-Aug-2024
  • (2023)Microstructural Investigation and Serial Section Tomography on ASIC Chips for Assurance Through Reverse Engineering Applications2023 IEEE Physical Assurance and Inspection of Electronics (PAINE)10.1109/PAINE58317.2023.10318025(1-8)Online publication date: 24-Oct-2023
  • Show More Cited By

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image ACM Other conferences
PCI '20: Proceedings of the 24th Pan-Hellenic Conference on Informatics
November 2020
433 pages
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 04 March 2021

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. Hardware security
  2. Internet of Things (IoT)
  3. Machine Learning

Qualifiers

  • Research-article
  • Research
  • Refereed limited

Conference

PCI 2020
PCI 2020: 24th Pan-Hellenic Conference on Informatics
November 20 - 22, 2020
Athens, Greece

Acceptance Rates

Overall Acceptance Rate 190 of 390 submissions, 49%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)49
  • Downloads (Last 6 weeks)3
Reflects downloads up to 24 Sep 2024

Other Metrics

Citations

Cited By

View all
  • (2024)Hardware Security for Internet of Things Identity AssuranceIEEE Communications Surveys & Tutorials10.1109/COMST.2024.335516826:2(1041-1079)Online publication date: Oct-2025
  • (2024)Enabling Lawful Interception in Environments Protected by IoT SafeguardElectronic Government and the Information Systems Perspective10.1007/978-3-031-68211-7_12(139-153)Online publication date: 15-Aug-2024
  • (2023)Microstructural Investigation and Serial Section Tomography on ASIC Chips for Assurance Through Reverse Engineering Applications2023 IEEE Physical Assurance and Inspection of Electronics (PAINE)10.1109/PAINE58317.2023.10318025(1-8)Online publication date: 24-Oct-2023
  • (2023)A Review of Authentication Methods in Internet of Drones2023 International Conference on Networking and Network Applications (NaNA)10.1109/NaNA60121.2023.00009(7-12)Online publication date: Aug-2023
  • (2023)The Role of SOC in Ensuring the Security of IoT Devices: A Review of Current Challenges and Future Directions2023 12th Mediterranean Conference on Embedded Computing (MECO)10.1109/MECO58584.2023.10155021(1-8)Online publication date: 6-Jun-2023
  • (2023)LOKI: A Secure FPGA Prototyping of IoT IP with Lightweight Logic Locking2023 IEEE Asia Pacific Conference on Circuits and Systems (APCCAS)10.1109/APCCAS60141.2023.00030(85-89)Online publication date: 19-Nov-2023
  • (2022)A Review on Software-Based and Hardware-Based Authentication Mechanisms for the Internet of DronesDrones10.3390/drones60200416:2(41)Online publication date: 8-Feb-2022
  • (2022)A comparative study of machine learning classifiers for secure RF-PUF-based authentication in internet of thingsMicroprocessors & Microsystems10.1016/j.micpro.2022.10460093:COnline publication date: 1-Sep-2022

View Options

Get Access

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

HTML Format

View this article in HTML Format.

HTML Format

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media